Time: Wed, 9:25 to 11:15 am
Location: AKW 100
Instructor: Joan Feigenbaum TF: Sam Marullo (sam.marullo@yale.edu)
Assistant: Judi Paige (AKW 507A, Judi.Paige@yale.edu, 203-436-1267)
Course Description
This course focuses on socio-technical problems in computing, i.e., problems that cannot be solved through technological progress alone but rather require legal, political, or cultural progress as well. Examples include but are not limited to computer security, intellectual property protection, cyber crime, cyber war, surveillance, and online privacy. The course is addressed to graduate students in Computer Science who are interested in socio-technical issues but whose undergraduate work may not have addressed them; it is designed to bring these students rapidly to the point at which they can do research on socio-technical problems. Students do term projects (either papers or software artifacts) and present them at the end of the term.
Enrollment limit
In order to ensure that there is enough time for both midterm feedback on project proposals and in-class presentation of the finished projects, enrollment is limited to fifteen. If fewer than fifteen Computer Science graduate students enroll, Yale College undergraduates will be allowed to enroll with permission of the instructor.
Prerequisites
The basics of cryptography and computer security (as covered in CPSC 467), networks (as covered in CPSC 433), and databases (as covered in CPSC 437), or permission of the instructor.
January 17, 2018: Introduction
January 24, 2018: "Fairness" in data mining, part 1
Government's
Motion to Compel (pp. 1-21 are required; pay particular attention
to the statement of facts and the legal test articulated.)
Apple's Motion to Vacate (pp. 1-32 are required;
note the tone of Apple's motion. Is the audience for this motion the
judge or the general public?)
The All Writs Act of 1789, 28 USC 1651(a):
"The Supreme Court and all courts established by Act of Congress
may issue all writs necessary or appropriate in aid of their respective
jurisdictions and agreeable to the usages and principles of law."
Be sure to click on all of the "next section" buttons in order to
see and read all of the text on this site.
In the "Protecting Your Intellectual Property" box, click on
"learn more." Near the bottom of that page, you will find
"Popular Articles About This Topic." Read the ones entitled
"What tools does Facebook provide to help me protect my intellectual
property in my videos?" and "What tools does Facebook provide to
help me enforce my intellectual property rights in advertisements
and sale posts?" (required) and, optionally, whichever others look
interesting to you.
Optional: "Bitcoin and Cryptocurrency Technologies,"
by Narayanan et al. (Not required but may be helpful for a more
thorough technical explanation of how cryptocurrency works. You should
skim pieces of it if you want more than the brief explanations in the
other two articles.)